Professional Documents
Culture Documents
2 out of 2 points
Examples of volatile storage are mass storage devices such as disks and
tapes.
Selected Answer:
Correct Answer:
False
False
Question 2
0 out of 2 points
It is the responsibility of the ____________________ to safeguard the
password file that stores all valid user name/password combinations.
Selected Answer:
Correct Answer:
Evaluation Method
user
Correct Answer
Exact Match
OS
Exact Match
operating system
Exact Match
OS (operating
system)
Exact Match
operating system
(OS)
Case Sensitivity
Question 3
0 out of 2 points
The first line of defense against illicit use of, or threats to, computer
resources and sensitive information is a strong ____ and authorization
process.
Selected Answer:
Correct Answer:
encryption
authentication
Question 4
0 out of 2 points
____ games allow a large number of players, often thousands or tens of
thousands, to interact, form groups, and compete against one another
within a simulated virtual world.
Selected Answer:
MMRPG
Correct Answer:
MMOG
Question 5
2 out of 2 points
The history of mathematics begins ____ years ago.
Selected Answer:
Correct Answer:
3,000 or more
3,000 or more
Question 6
0 out of 2 points
The ____ was the first fully electronic general-purpose programmable
computer.
Selected Answer:
Mark I
Correct Answer:
ENIAC
Question 7
2 out of 2 points
A(n) ____ handles the details of input/output and compensates for any
speed differences between I/O devices and other parts of the computer.
Selected Answer:
Correct Answer:
I/O controller
I/O controller
Question 8
0 out of 2 points
The ____ are the devices that allow a computer system to communicate
and interact with the outside world as well as store information.
Selected Answer:
Correct Answer:
Question 9
registers
input/output units
0 out of 2 points
The sequence of operations that must be completed successfully to
produce a realistic three-dimensional image sequence is termed the ____.
Selected Answer:
graphics perspective
Correct Answer:
graphics pipeline
Question 10
0 out of 2 points
Wireless communications are a(n) ____________________-generation
innovation in computing.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
first
Correct Answer
Case Sensitivity
fifth
Question 11
0 out of 2 points
One way to achieve speedup in real-time graphics is to avoid the use of
____________________ that, although they produce high-quality images,
simply take too much time.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
gif
Correct Answer
Case Sensitivity
algorithms
Question 12
2 out of 2 points
____, such as text editors, are sometimes organized into collections called
program libraries.
Selected Answer:
Correct Answer:
Question 13
Utilities
Utilities
0 out of 2 points
The ____ of a disk is the time needed to position the read/write head over
the correct track.
Selected Answer:
latency
Correct Answer:
seek time
Question 14
0 out of 2 points
In 1952, a UNIVAC I cost $12 million.
Selected Answer:
Correct Answer:
True
False
Question 15
0 out of 2 points
Leibnizs ____________________ could carry out addition, subtraction,
multiplication, and division.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
calculator
Correct Answer
Case Sensitivity
Wheel
Question 16
2 out of 2 points
Algorithms usually contain a set of instructions to be executed in any
order.
Selected Answer:
Correct Answer:
False
False
Question 17
0 out of 2 points
In a ____, the original contents of the memory cell are unchanged.
Selected Answer:
Correct Answer:
Question 18
2 out of 2 points
The exchange of setup information between the client and server,
preparatory to exchanging real data, is known as a ____.
Selected Answer:
Correct Answer:
handshake
handshake
Question 19
0 out of 2 points
In a ____ cipher a single letter of plaintext generates a single letter of
ciphertext.
Selected Answer:
Correct Answer:
shift
substitution
Question 20
0 out of 2 points
System software acts as a(n) ____ between the users and the hardware.
Selected Answer:
Correct Answer:
translator
intermediary
Question 21
0 out of 2 points
The star topology connects the network nodes in a circular fashion, with
messages circulating in either a clockwise or counterclockwise direction
until they reach their destination.
Selected Answer:
Correct Answer:
True
False
Question 22
2 out of 2 points
____ is the ability to share physical resources, such as a printer or storage
device, as well as logical resources, such as software and information.
Selected Answer:
Resource sharing
Correct Answer:
Resource sharing
Question 23
0 out of 2 points
While WiMAX is great for communicating with a nearby router, its
transmission limit means it cannot provide mobile Internet access from a
car or outdoor site far from any base station.
Selected Answer:
Correct Answer:
True
False
Question 24
0 out of 2 points
Related recordssay, the records of all the employees in a single
companyare kept in a ____.
Selected Answer:
data network
Correct Answer:
data file
Question 25
2 out of 2 points
Any positive ____________________ is either a prime number or a number
that can be written in a unique way as a product of prime factors.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
integer
Correct Answer
Case Sensitivity
integer
Question 26
2 out of 2 points
A standard data DVD holds ____ GB of data.
Selected Answer:
Correct Answer:
4.7
4.7
Question 27
2 out of 2 points
A text file can be hidden in an image file by changing (if needed) the least
significant bit of each byte of the image file to match the
____________________ form of the characters in the text.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
binary
Correct Answer
Case Sensitivity
binary
Question 28
2 out of 2 points
The ____ hides from the user the messy details of underlying hardware.
Selected Answer:
Correct Answer:
interface
interface
Question 29
0 out of 2 points
Building massive, integrated government databases raises fewer technical
questions than legal, political, social, and ethical ones.
Selected Answer:
Correct Answer:
False
True
Question 30
2 out of 2 points
Icons displayed on the screen are selected with a mouse and a button
using a technique called ____.
Selected Answer:
Correct Answer:
Question 31
0 out of 2 points
Translators for ____ are called compilers.
point-and-click
point-and-click
Selected Answer:
Correct Answer:
machine language
high-level languages
Question 32
2 out of 2 points
In the SIMD parallel processing model, the control unit ____ instructions to
every ALU.
Selected Answer:
Correct Answer:
broadcasts
broadcasts
Question 33
2 out of 2 points
____ are fully modeled and fully rendered objects stored in a video library
in video memory.
Selected Answer:
Correct Answer:
Cut-ins
Cut-ins
Question 34
0 out of 2 points
____ allow the physical data to reside at separate and independent
locations that are electronically networked together.
Selected Answer:
Correct Answer:
Discrete databases
Distributed databases
Question 35
2 out of 2 points
To solve the problem of two users having the same password, some
operating systems keep a third entry for each user in the password file,
namely ____ at which the user created the password.
Selected Answer:
Correct Answer:
Question 36
0 out of 2 points
____ means keeping information securethat is, protected from those who
should not have access to it.
Selected Answer:
Correct Answer:
Information assurance
Information security
Question 37
2 out of 2 points
In theoretical computer science, researchers study the logical and ____ of
problems and their solutions.
Selected Answer:
Correct Answer:
mathematical properties
mathematical properties
Question 38
2 out of 2 points
A ____ executes instructions in parallel with the CPU, the main processor,
and carries out all graphics operations including modeling, motion,
rendering, and display.
Selected Answer:
GPU
Correct Answer:
GPU
Question 39
0 out of 2 points
Charles Babbage gave up on his second ____________________ because the
current technology could not support his project.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
calculator
Correct Answer
Difference Engine
Case Sensitivity
Question 40
2 out of 2 points
Atari released its first product in 1974, an arcade game called ____.
Selected Answer:
Correct Answer:
Pong
Pong
Question 41
2 out of 2 points
The main difficulty with a symmetric algorithm is how to securely transmit
the secret key.
Selected Answer:
Correct Answer:
True
True
Question 42
0 out of 2 points
A block cipher encodes one character at a time.
Selected Answer:
Correct Answer:
True
False
Question 43
2 out of 2 points
The instructions that can be decoded and executed by the control unit of a
computer are represented in machine language.
Selected Answer:
Correct Answer:
True
True
Question 44
2 out of 2 points
A movie is an interactive environment.
Selected Answer:
Correct Answer:
False
False
Question 45
0 out of 2 points
In the early 1980s, TCP/IP was used only in the United States.
Selected Answer:
Correct Answer:
True
False
Question 46
2 out of 2 points
An operation that is unambiguous is called a ____ operation of the
computing agent carrying out the algorithm.
Selected Answer:
Correct Answer:
primitive
primitive
Question 47
0 out of 2 points
The first slide rule appeared around ____.
Selected Answer:
Correct Answer:
1183
1622
Question 48
2 out of 2 points
____ operation codes are restricted to be used in the operating system or
other system software.
Selected Answer:
Correct Answer:
Privileged
Privileged
Question 49
0 out of 2 points
A database management system works much like a simple file manager.
Selected Answer:
Correct Answer:
True
False
Question 50
0 out of 2 points
During the ____ generation of computing, the desktop machine shrunk to
the size of a typewriter.
Selected Answer:
Correct Answer:
Thursday, November 12, 2015 12:30:08 AM EST
OK
third
fourth